Dear @AppleSupport, we noticed a *HUGE* security issue at MacOS High Sierra. Anyone can login as "root" with empty password after clicking on login button several times. Are you aware of it @Apple?
-
Show this thread
-
You did privately disclose this to them first, right?
6 replies 4 retweets 82 likes -
Replying to @dokas @lemiorhan and
You didn’t just tell a guy who found something what to do with his finding, right?
1 reply 0 retweets 59 likes -
Replying to @rem1nd_ @lemiorhan and
Responsible disclosure is the most important part of disclosure.
4 replies 5 retweets 171 likes -
Responsible disclosure is a choice, not a requirement. Heck, half the time it doesn't even work at all and makes everyone less safe by delaying action. In this case? The vuln is trivial enough and embarrassing enough (but limited; needs local access) that I'd say it's a wash.
2 replies 2 retweets 28 likes -
This does not require local access. It's exploitable remotely if "Screen Sharing" is enabled. Other sharing services may also be affected (authentication bypass).
1 reply 2 retweets 2 likes -
By that do you mean the authentication bypass on the *initial* connection to the screen or just escalation once already connected?
1 reply 0 retweets 1 like -
For Screen Sharing it's both: You can auth as root in the initial request, which gets you to the regular login screen (also affected by the bug, so you can log into a desktop session as root)
2 replies 2 retweets 4 likes
That's pretty fucked up; implies the problem is deep in the bowels of the authentication system. Has anyone tried SSH? Still, this is so ridiculous (and trivial to find) I wouldn't have given them more than 14 days to fix and roll out the fix before full disclosure.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.